{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:26:14.975","vulnerabilities":[{"cve":{"id":"CVE-2022-21819","sourceIdentifier":"psirt@nvidia.com","published":"2022-03-11T14:15:07.700","lastModified":"2024-11-21T06:45:29.837","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. Such an attack could result in denial of service, code execution, escalation of privileges, and impact to data integrity and confidentiality. The scope impact may extend to other components."},{"lang":"es","value":"Las distribuciones de NVIDIA de Jetson Linux contienen una vulnerabilidad en la que un error en la configuración de IOMMU puede permitir a un atacante no privilegiado con acceso físico a la placa el acceso directo de lectura/escritura a todo el espacio de direcciones del sistema mediante el bus PCI. Tal ataque podría resultar en la denegación de servicio, una ejecución de código, una escalada de privilegios y el impacto en la integridad y confidencialidad de los datos. El impacto del alcance puede extenderse a otros componentes"}],"metrics":{"cvssMetricV31":[{"source":"psirt@nvidia.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@nvidia.com","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*","versionStartIncluding":"32.1","versionEndExcluding":"32.7.1","matchCriteriaId":"3F748589-5DF3-4AC1-B23B-69A4D8CC7305"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:nvidia:jetson_nano:-:*:*:*:*:*:*:*","matchCriteriaId":"2B2B041F-21A8-4F0B-BBAF-7CDD8B911547"},{"vulnerable":false,"criteria":"cpe:2.3:h:nvidia:jetson_nano_2gb:-:*:*:*:*:*:*:*","matchCriteriaId":"52E153CA-BE89-4C66-8B72-8901BF592423"}]}]}],"references":[{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5321","source":"psirt@nvidia.com","tags":["Vendor Advisory"]},{"url":"https://www.thegoodpenguin.co.uk/blog/pcie-dma-attack-against-a-secured-jetson-nano-cve-2022-21819/","source":"psirt@nvidia.com"},{"url":"https://nvidia.custhelp.com/app/answers/detail/a_id/5321","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.thegoodpenguin.co.uk/blog/pcie-dma-attack-against-a-secured-jetson-nano-cve-2022-21819/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}